[DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.
[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.
a. Recognize user tracking methods and hazards.
Examples: Cookies, WiFi packet sniffing.
b. Understand how to apply techniques to mitigate effects of user tracking methods.
c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.
d. Explain the relationship between online privacy and personal security.
Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.
e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.
Examples: Cyberbullying/harassment, inappropriate sexual communications.
f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.
[DLIT] (9-12) 18 :
12) Describe how sensitive data can be affected by malware and other attacks.
[DLIT] (9-12) 19 :
13) Compare various security measures of a computer system.
Examples: Usability, security, portability, and scalability.
[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.
Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.
[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.
[DLIT] (9-12) 35 :
29) Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.
[DLIT] (9-12) 36 :
30) Evaluate the tradeoffs involved in choosing methods for the organization of data elements and the location of data storage, including the advantages and disadvantages of networked computing.
Examples: Client server, peer-to-peer, cloud computing.